Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
China Information Security
1009-8054
2008 Issue 2
A Text Filter Method against Chinese Vicious-topic Information
SUN Deng-lin;LI Sheng-hong;JING Tao;LIU Gong-shen
..............
page:92-93,96
Detection of Audio Forgeries Based on Bispectral Analysis
GAO Yang;HUANG Zheng;XU Che;SHI Shao-pei;YANG Xu
..............
page:94-96
Reconfigurable Design and Implementation of Modulo Multiplication
LI Jun;LV Yong-qi
..............
page:97-99
A New Model of Security Auditing System
YANG Zhi-wei
..............
page:89-91
Research on IPSec Anti-Replay's Influence Network QoS
ZHOU Jun
..............
page:86-88,91
Research on Optimum Test of S-boxes in Rijndael
WANG De;SUN Shi-liang
..............
page:84-85
Design of Password Authenticated Key Exchange Protocol
Song Yu-bo;Chen Kai-zhi;Wu Ya-jun
..............
page:81-83
Evaluation System for Network Attack Effect Based on IDS
LI Qin;ZENG Fan-ping;LI Ling;YIN Kai-tao
..............
page:79-80,83
DoS Attack by Defect of authentication in Mobile IP and its Prevention
XU Yan;WANG Wen-sheng
..............
page:76-78
Application of Mesh Security Association in WLAN Mesh Networks
SUN Hao;WU Yue
..............
page:73-75
Escorting IT Application, Convoying Service Security
LV Ming
..............
page:44-45
Ten Years' Westone Advancing Towards Large-scale Production
CUI Guang-yao
..............
page:43
"Cut the Garment according to the Figure" for Infosec Hardware Platform
BAI Jie
..............
page:41-42
PCI Standard and Its Application Situation Analysis
LIU Yan
..............
page:38-40
Study on China's Qualification Management of Information Security Service
CHEN Xiao-hua
..............
page:35-37,40
Guaranteeing the Security of "Digital Petroleum"
BAI Jie
..............
page:32-34
Report on Technical Analysis of 2007 Computer Virus Situation Investigation
..............
page:28-31
Focus on Changeable Situation in Antivirus Field
HU Yiao-he;LI Xue;BAI Jie;CUI Guang-yao
..............
page:6-27
Planning Lies With Man and With Plan for Man
CUI Guang-yao
..............
page:1
Give All-out Support to the Guarantee of Network and Information Security of Olympic Games Industry Events
..............
page:2-3
Industry Events
..............
page:3-4
Research and Implementation of Security Management Technology in Classified Network
ZHAI Jian-hong;ZHANG Yue;LIU Ya-wei
..............
page:70-72
A Method of Detecting the Handler on DDoS Attacks
CHONG Ling-zi;YANG Mu-qing;JIAO Bian-bian
..............
page:68-69
Design on Combination System of Distributed Firewall and Invading Detection
SHI Li-li;XUE Zhi;WANG Yi-jun
..............
page:65-67
Optimizing Method of Weight in Information Security Risk Assessment
ZHOU Ying;QU Hai-peng;FENG Qing-yun;GUO Zhong-wen
..............
page:63-64,67
A Trust Management Model based on Bayesian Network
GUO Xiao-qiong;GUAN Hai-bing
..............
page:61-62
Security Analysis of IHO Data Protection Scheme
GONG Jie-zhong;CHEN Gong-liang;XU Heng;XIE Xiao-ning
..............
page:59-60
The Interference Study of Wireless Network Technology in Digital Home
WANG Bin;TIAN Sen-ling;CHEN Hui-juan
..............
page:56-58
Modified DOA Estimation Algorithm For Reducing Correlation of Multi-path Signals
DING Ting;HUANG Deng-shan
..............
page:53-55
Sophos Terminal Security & Control System
..............
page:52
Protector of Network Hacker and Spam Traffic——JUMP's Intrusion Defending System
li jin ku ; ding chang fu
..............
page:50-51
Insurance Plus Safety, Insuring Is More Safe
..............
page:48-49
Risk Evaluation: Infosec Wins at the Starting Point
..............
page:47,49
Check-Point Products Applied in Certain Financial Users
..............
page:46